June 29, 2017 By Douglas Bonderud 2 min read

Mobile ransomware is a huge headache. Beyond the inconvenience of locking down files and demanding cash for their release, Threatpost pointed out that most pieces of malicious code don’t leverage vulnerabilities to exploit devices but rely on users to download programs, which in turn give cybercriminals total system access.

Recently, Kaspersky Lab reported that a rise in Android malware increased 2017 first-quarter attacks threefold compared to 2016 — thanks to Svpeng.

Svpeng Boosts Mobile Ransomware Infections

According to Kaspersky Lab, from the beginning of 2015 through the end of 2016, mobile ransomware attacks fell almost 5 percent. But a sudden spike in December 2016 of the Svpeng malware family pushed early 2017 numbers up and over previous totals.

Until recently, two families of malware, Svpeng and Fusob, shared the mobile space more or less equally. Fusob tricks users into downloading a fake adult content player that then locks devices and demands a $100 to $200 ransom.

Svpeng, meanwhile, got its start in 2013 as a banking Trojan but has been modified to include ransomware functionality. Using a variety of techniques — from SMS messaging to fake video players to supposed updates for Adobe Flash players — Svpeng finds its way onto user devices, locks all files and may display a false FBI warning for downloading illegal content. Getting files back requires a payout of $100 to $500 with no guarantee of success.

PYMNTS.com said cybercriminals are shifting their focus to U.S. markets, while Canada, Germany and the U.K. remain popular targets. All of these countries enjoy widespread adoption of mobile and e-payment systems, making it more likely for malicious actors to succeed in extorting a cryptocurrency ransom.

A Growing Market

So why the sudden uptick in mobile ransomware? At first glance mobile devices seem like less-than-ideal candidates, since they’re often equipped with decent security measures and don’t offer attackers much in the way of easily exploitable vulnerabilities. However, the ubiquity of mobile devices and the way users interact with their devices makes them the perfect avenue for infection.

If device owners want something to improve their mobile experience, they want it immediately. That means they are likely to grant broad permissions if malicious software appears at the just the right moment, promising easy access to content or a quick fix for device issues.

While mobile malware is growing in sophistication, it’s also becoming more commercially available, allowing users with minimal skill to deploy ransomware across multiple platforms. The result? A booming economy for infections such as Svpeng and Fusob, and frustration for mobile users who weren’t expecting a sudden lockdown of personal files and demands for bitcoin payment.

While it’s easy to get stung by Svpeng or other strains of mobile ransomware, handing over the digital cash isn’t a good idea, iTWire explained. Just because fraudsters get paid doesn’t mean they’ll honor their end of the agreement and return devices to their original condition. And if victims pay up once, chances are they’ll do so multiple times. Put simply, spending to spring a smartphone from Svpeng only ramps up security risk.

Mobile ransomware is on the rise thanks to strong performance by Fusob and diversification in the Svpeng family. Staying safe means avoiding obvious traps — video players and Flash updates top this list — and passing on payment, even when pressured.

More from

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today